共 15 条
- [2] Quantitative hierarchical threat evaluation model for network security [J]. Ruan Jian Xue Bao, 2006, 4 (885-897): : 885 - 897
- [3] Do Hoon Kim, 2007, 2007 3rd International Symposium on Information Assurance and Security, P177
- [4] Hansen N, 2006, STUD FUZZ SOFT COMP, V192, P75
- [5] Lai JB, 2006, 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, P1545
- [6] Li D., 2017, Artificial Intelligence with Uncertainty
- [7] Li DY., 1995, J COMPUTER RES DEV, V32, P16
- [8] Ren Wei, 2006, Computer Engineering and Applications, V42, P136
- [10] Belief rule-base inference methodology using the evidential reasoning approach - RIMER [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (02): : 266 - 285